For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeCPA®CPA ISC Practice Exam 3
    CPA®

    CPA ISC Practice Exam 3

    82 free questions · No sign-up required to browse

    Comprehensive practice exam for the CPA Information Systems and Controls (ISC) discipline, covering Information Systems, Data Management, Security, and SOC Engagements based on the 2026 AICPA Blueprint.

    82
    Questions
    Hard
    Difficulty
    75%
    Pass mark

    Difficulty breakdown

    Easy(23)
    Medium(45)
    Hard(14)

    Topics covered

    Browse all topics →
    Area I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea I: Information SystemsArea II: SecurityArea II: SecurityArea II: SecurityArea II: SecurityArea II: SecurityArea II: SecurityArea II: SecurityArea II: SecurityArea III: SOC EngagementsArea III: SOC EngagementsArea III: SOC EngagementsArea III: SOC Engagements

    Sample questions

    Q01Medium1 mark

    A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based solution. The client wants to minimize their internal IT team's responsibility for managing the underlying operating system, middleware, and runtime environment, but they want to retain control over the deployed applications and configuration settings. Which cloud service model is MOST appropriate for this client?

    View question with guidance →
    Q02Medium1 mark

    During a review of a client's cloud governance structure, an auditor notes that the client uses a public cloud provider for customer-facing web applications but keeps sensitive financial data on a private on-premise server. The two environments are connected via an encrypted VPN. Which deployment model is this client utilizing?

    View question with guidance →
    Q03Hard1 mark

    An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan origination system. The auditor discovers that the system automatically rejects loan applications with incomplete data fields but does not generate an error log for these rejections. Which specific processing integrity risk does this control deficiency primarily exacerbate?

    View question with guidance →
    Q04Hard1 mark

    A company uses a batch processing system to update inventory records overnight. The 'Grandfather-Father-Son' backup rotation scheme is used. On Thursday morning, the 'Son' (Wednesday night's backup) is found to be corrupted. To restore the system to the most current state possible before the corruption, which tapes are required?

    View question with guidance →
    Q05Medium1 mark

    During a walkthrough of the change management process, an auditor observes that the 'Developer' role in the ERP system has access to 'Migrate to Production'. The IT Manager explains this is necessary for emergency fixes overnight when the Change Manager is unavailable. What is the auditor's BEST course of action?

    View question with guidance →

    Ready to Practice the full exam?

    All 82 questions with worked answers, mark schemes, and AI tutoring.

    Sign up freeTake the exam

    All questions (82)

    Free to browse · no sign-up required
    Q01A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based solution. The client ...MediumQ02During a review of a client's cloud governance structure, an auditor notes that the client uses a public cloud provid...MediumQ03An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan origination system. ...HardQ04A company uses a batch processing system to update inventory records overnight. The 'Grandfather-Father-Son' backup r...HardQ05During a walkthrough of the change management process, an auditor observes that the 'Developer' role in the ERP syste...MediumQ06An auditor is reviewing a SQL query used to extract 'Active Customers' for a marketing report. The query is:<br/><br/...HardQ07A healthcare provider stores patient records in a data warehouse. To comply with HIPAA while allowing data analysts t...MediumQ08Under the General Data Protection Regulation (GDPR), a data subject requests that a company transmit their personal d...MediumQ09A service organization is undergoing a SOC 2® Type II engagement. The auditor finds that for a sample of 25 new hires...HardQ10Which of the following scenarios BEST describes a 'Carve-out' method in a SOC 2® report involving a subservice organi...MediumQ11An IT auditor is reviewing the 'Recovery Point Objective' (RPO) for a critical transaction database. Management has s...MediumQ12Which of the following NIST Cybersecurity Framework (CSF) functions is PRIMARILY associated with the implementation o...MediumQ13A retailer processes credit card transactions. They have segmented their network so that the Cardholder Data Environm...MediumQ14An organization uses a 'Defense in Depth' strategy. Which of the following represents a correct layering of controls ...MediumQ15A CPA is performing a SOC 2® engagement. The service organization uses a third-party data center for physical hosting...EasyQ16Which of the following is a 'Complementary User Entity Control' (CUEC) likely to be found in a payroll service provid...MediumQ17In the context of COBIT 2019, which of the following best describes the distinction between Governance and Management?HardQ18An auditor is testing a control that requires 'Three-way matching' before a payment is authorized. Which three docume...EasyQ19A company implements a 'Zero Trust' architecture. Which of the following principles is central to this approach?MediumQ20An auditor is reviewing a SOC 2® report and notices the opinion is 'Qualified'. What does this indicate?MediumQ21Which of the following is a primary responsibility of the 'Data Controller' under GDPR?EasyQ22A company uses an 'Incremental' backup strategy. A full backup is performed on Sunday. Incremental backups are perfor...MediumQ23Which of the following SQL commands is used to remove a table and all its data permanently from the database?EasyQ24An auditor is assessing the 'Availability' criteria for a cloud service provider. The provider claims 99.9% uptime. W...MediumQ25A company is subject to HIPAA. An employee loses a company laptop containing unencrypted ePHI (electronic Protected H...HardQ26Which of the following is a characteristic of a 'Symmetric' encryption algorithm?EasyQ27An auditor observes that a company uses a 'Hot Site' for disaster recovery. What does this imply?MediumQ28In a SOC 2® engagement, which Trust Services Criteria category is MANDATORY for every report?EasyQ29A developer is writing a SQL query to combine customer data from the 'Sales' table and the 'Support' table. They want...MediumQ30Which of the following is an example of a 'Preventive' control?EasyQ31An auditor is reviewing a client's compliance with the NIST Privacy Framework. The client has a process to 'notify in...HardQ32A company uses a 'Phishing Simulation' to test employees. This is primarily a test of which security domain?EasyQ33Which of the following describes a 'Logic Bomb'?MediumQ34An auditor is reviewing the 'Change Management' process. They find that the 'Request for Change' (RFC) form does not ...MediumQ35A service organization provides a cloud-based accounting platform. They want to assure their customers that the syste...MediumQ36Which of the following is a key requirement of the HIPAA Security Rule but NOT the Privacy Rule?HardQ37An auditor is reviewing a firewall configuration. They see a rule at the bottom of the Access Control List (ACL) that...MediumQ38Which of the following is a risk associated with using a 'Public Blockchain' for financial reporting?HardQ39A company wants to ensure that their web application can handle a sudden spike in traffic during Black Friday sales. ...MediumQ40An auditor is testing the 'Logical Access' controls for an ERP system. They select a sample of new employees and veri...MediumQ41Which of the following is a primary benefit of using a 'Data Lake' compared to a 'Data Warehouse'?MediumQ42An organization discovers a vulnerability in their web server software. The vendor has released a patch, but the orga...HardQ43Which of the following statements accurately describes the 'Integrity' component of the CIA Triad?EasyQ44A company is using the 'Inclusive Method' for a subservice organization in their SOC 2® report. What does this imply ...HardQ45Which of the following is a 'Corrective' control?MediumQ46An auditor is reviewing a database schema. They notice that the 'SocialSecurityNumber' column is stored in cleartext....EasyQ47What is the primary purpose of a 'Management Assertion' in a SOC engagement?MediumQ48A company uses a biometric fingerprint scanner and a PIN code for server room access. What type of authentication is ...EasyQ49Which CIS Control is typically prioritized as Control #1 because you cannot protect what you do not know you have?MediumQ50An auditor is reviewing the 'Incident Response Plan'. The plan includes a step for 'Containment'. What is the primary...EasyQ51A company uses a 'Cold Site' for disaster recovery. Which of the following is the primary disadvantage of this approach?MediumQ52Which of the following attacks involves an attacker intercepting communication between two parties and relaying messa...EasyQ53An auditor is reviewing the 'Segregation of Duties' (SoD) in the payroll process. Which two roles should be separated?MediumQ54A company uses 'Asymmetric' encryption for secure email. If Alice wants to send a confidential email to Bob that only...HardQ55Which of the following is a 'Detective' control?EasyQ56An auditor is evaluating the 'Completeness' of data transfer from a legacy system to a new ERP. Which technique is MO...MediumQ57Under COBIT 2019, which component of the governance system describes the 'rules of the game'?MediumQ58A company wants to implement a 'Least Privilege' model for its cloud storage buckets. What does this entail?EasyQ59An auditor is reviewing a SOC 2® Type II report. The testing period covers January 1 to December 31. The auditor noti...MediumQ60Which of the following is an example of 'SaaS' (Software as a Service)?EasyQ61A company is designing a new data center. They install a 'Biometric Mantrap' at the entrance. What is the purpose of ...MediumQ62An auditor is reviewing a SQL query: `SELECT * FROM Employees WHERE Salary > 100000;`. What is the risk of using `SEL...MediumQ63Which of the following is a 'Type 1' SOC report?MediumQ64A company is implementing a 'Data Loss Prevention' (DLP) solution. Which of the following is a primary function of DLP?MediumQ65Which of the following is a 'Physical' security control?EasyQ66An auditor is reviewing the 'Change Management' logs and notices a change labeled 'Emergency Fix' that was deployed w...MediumQ67Which of the following is a characteristic of 'Ransomware'?EasyQ68A company uses a 'VPN' (Virtual Private Network) for remote employees. What is the primary security function of the VPN?EasyQ69In a relational database, what is a 'Foreign Key'?MediumQ70An auditor is testing the 'Termination' process. They find that a terminated employee's Active Directory account was ...EasyQ71Which of the following is a requirement of the 'NIST SP 800-53' framework?MediumQ72A company uses 'Input Validation' on its web forms. Which attack does this primarily prevent?MediumQ73An auditor is assessing 'Independence' for a SOC engagement. Which of the following would impair independence?EasyQ74What is the difference between 'Authentication' and 'Authorization'?EasyQ75A company uses 'Containerization' (e.g., Docker) for its applications. From an auditor's perspective, what is a key d...HardQ76An auditor is reviewing the 'System Description' in a SOC 2® report. Which of the following MUST be included?MediumQ77Which of the following is a 'Social Engineering' technique?MediumQ78A company uses 'Role-Based Access Control' (RBAC). How are permissions assigned?EasyQ79An auditor is reviewing the 'Business Continuity Plan' (BCP). Which of the following is a key component that determin...MediumQ80Which of the following is a 'Subsequent Event' in a SOC engagement?MediumQ81A company uses 'Hashing' to store passwords. Why is this better than encryption?MediumQ82An auditor is reviewing the 'System Boundaries' in a SOC 2® engagement. The client has excluded their 'Customer Suppo...Hard